NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Peer reviewed Peer reviewed
Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers